Vulnerability CVE-2019-8320


Published: 2019-06-06

Description:
A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
8.8/10
9.2/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Complete
Complete
Affected software
Rubygems -> Rubygems 

 References:
https://access.redhat.com/errata/RHSA-2019:1429
https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
https://hackerone.com/reports/317321

Copyright 2024, cxsecurity.com

 

Back to Top